Dissertation > Excellent graduate degree dissertation topics show

Research on Blind Signature and Designated Verifier Signature Scheme

Author: HanPei
Tutor: WangShangPing
School: Xi'an University of Technology
Course: Applied Mathematics
Keywords: Digital Signature Identity-based Blind signature Designated verifier signature
CLC: TN918.1
Type: Master's thesis
Year: 2009
Downloads: 14
Quote: 0
Read: Download Dissertation

Abstract


As human beings into the information age , the application of computer and Internet technology has become increasingly widespread, it penetrates to the society in all walks of life . In e-commerce , e-government is becoming social Keywords , network security has become increasingly important . E-commerce activities , businesses, consumers and banks are connected to the open Internet together , which put forward higher requirements for the security and confidentiality of network data transmission process . Digital signature technology as an important guarantee of the network security , message authentication plays a huge role . However , on many occasions , such as electronic payments , electronic elections , both the validity of the message to certification , they need to ensure anonymity . Therefore , based on the different needs of the application background , we need to study a special purpose digital signature . Blind signature and designated verifier signature scheme in-depth study and research work are as follows : efficient Xiaoming Hu and Shangteng Huang , restrictive partially blind signature scheme based on the identity of the security flaws , described the defects potentially serious consequences . Subsequently , an improved identity-based restrictive partially blind signature scheme , the new and improved program effectively overcome the negotiated forgery of public information , and the algorithm also maintain efficiency . In view of the universal designated multi verifier signature scheme under the existing standard model (UDMVS) is relatively small. Jianhong Zhang and Cheng Ji efficient designated verifier signature scheme , a non- random oracle model under the efficient universal designated multi verifier signature scheme . Referred to the program not only in the standard model is provable secure, reduce the computational complexity of the algorithm to improve the computational efficiency .

Related Dissertations

  1. Subliminal Channel in Multisignature,TN918.1
  2. Study on System of Electronic Documetnt Security Signature,TN918.2
  3. The Research on the Divisibility of E-Cash,F713.36
  4. The Design and Implementation of Student Information Management System Based on Workflow,TP311.52
  5. Analysis and improvement of several e-cash payment scheme,TP393.08
  6. Research and Application of digital signature system based on smart cards,TP393.08
  7. Research on the Security in Wireless Sensor Network,TN915.08
  8. Research and Design of Secure Comunication of NVD on Demand System,TP309
  9. Identity-Based Authentication System Research and Implementation,TN918.1
  10. Drug Safety Supervision System Research and Implementation,F203
  11. Traitor Tracing and Revocation Mechanisms with Privacy Preserving,TN918.1
  12. Design and Application of Electronic Payment Protocol in Electronic Commerce,TP393.08
  13. Blind Signature Design and Its Application in Electronic Business,F713.36
  14. Analysis and improvement of proxy blind signature scheme,TN918.1
  15. Research and Implementation of PrivacyCA System in Trusted Computing,TP393.08
  16. The Office Automation Work System Key Technologies Based on the ASP.NET the Research,TP317.1
  17. Applied Research of Electronic Seal Technology in Production Management System Application,TP309.7
  18. Design and Analyses of Concurrent Signature Schemes Based on Designated Verifiers,TN918.2
  19. Continued fraction linear lower bound on the number of identity-based signature,TN918.1
  20. Research on Special Digital Signature Scheme Based on the Bilinear Pairing,TN918.1
  21. Forward-Secure Signature Research Based on Public Key Cryptosystem,TN918.1

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile